{"id":"CVE-2017-9146","details":"The TNEFFillMapi function in lib/ytnef.c in libytnef in ytnef through 1.9.2 does not ensure a nonzero count value before a certain memory allocation, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted tnef file.","modified":"2026-03-14T09:26:45.608776Z","published":"2017-05-22T18:29:00.223Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LFJWMUEUC4ILH2HEOCYVVLQT654ZMCGQ/"},{"type":"WEB","url":"https://usn.ubuntu.com/3667-1/"},{"type":"ADVISORY","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862707"},{"type":"EVIDENCE","url":"https://github.com/Yeraze/ytnef/issues/47"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yeraze/ytnef","events":[{"introduced":"0"},{"last_affected":"b4133d866edf362b332baff506e4a77359c7262a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.9.2"}]}}],"versions":["v1.7","v1.8","v1.9","v1.9.1","v1.9.1-2","v1.9.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9146.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}